Click here to download all references as Bib-File.•
2017-01-25
⋅
Microsoft
⋅
Detecting threat actors in recent German industrial attacks with Windows Defender ATP APT41 |
2016-12-14
⋅
Microsoft
⋅
Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe PROMETHIUM |
2016-12-14
⋅
Microsoft
⋅
Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe NEODYMIUM |
2016-12-09
⋅
Microsoft
⋅
Windows 10: protection, detection, and response against recent Depriz malware attacks TERBIUM |
2016-07-13
⋅
Microsoft
⋅
Troldesh ransomware influenced by (the) Da Vinci code Troldesh |
2016-06-09
⋅
Microsoft
⋅
Reverse-engineering DUBNIUM DarkHotel |
2016-06-09
⋅
Microsoft
⋅
Reverse-engineering DUBNIUM DarkHotel |
2016-04-26
⋅
Microsoft
⋅
PLATINUM Targeted attacks in South and Southeast Asia AMTsol PLATINUM |
2016-04-26
⋅
Microsoft
⋅
Digging deep for PLATINUM PLATINUM |
2015-11-20
⋅
Microsoft
⋅
Microsoft Security Intelligence Report Volume 19 XTunnel |
2015-09-08
⋅
FireEye
⋅
Two for One: Microsoft Office Encapsulated PostScriptand Windows Privilege Escalation Zero-Days REDSALT |
2015-05-01
⋅
FireEye
⋅
HIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC BLACKCOFFEE |
2014-05-16
⋅
Secureworks
⋅
APT Campaign Leverages the Cueisfry Trojan and Microsoft Word Vulnerability CVE-2014-1761 Cueisfry |
2013-02-22
⋅
Microsoft
⋅
Bamital Botnet Takedown Is Successful; Cleanup Underway Bamital |
2013-02-22
⋅
Microsoft
⋅
Recent Cyberattacks WildNeutron |
2012-09-13
⋅
Microsoft
⋅
Microsoft Disrupts the Emerging Nitol Botnet Being Spread through an Unsecure Supply Chain Nitol |
2011-08-27
⋅
Microsoft
⋅
Morto.A Morto |
2011-05-19
⋅
Microsoft
⋅
Win32/Expiro Expiro |
2011-03-28
⋅
KrebsOnSecurity
⋅
Microsoft Hunting Rustock Controllers Rustock |
2011-03-08
⋅
Microsoft Security Intelligence
⋅
Worm:Win32/Yimfoca.A Buzus |
2010-07-14
⋅
The Atlantic
⋅
Who Was the 12th Russian Spy at Microsoft? |